EP1151576A1 - Procede cryptographique a cles publique et privee - Google Patents
Procede cryptographique a cles publique et priveeInfo
- Publication number
- EP1151576A1 EP1151576A1 EP99973617A EP99973617A EP1151576A1 EP 1151576 A1 EP1151576 A1 EP 1151576A1 EP 99973617 A EP99973617 A EP 99973617A EP 99973617 A EP99973617 A EP 99973617A EP 1151576 A1 EP1151576 A1 EP 1151576A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- mod
- log
- following
- calculation
- cryptogram
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 126
- IWYDHOAUDWTVEP-UHFFFAOYSA-N mandelic acid Chemical compound OC(=O)C(O)C1=CC=CC=C1 IWYDHOAUDWTVEP-UHFFFAOYSA-N 0.000 claims abstract description 7
- 238000004364 calculation method Methods 0.000 claims description 58
- 238000004891 communication Methods 0.000 claims description 28
- 238000012545 processing Methods 0.000 claims description 17
- 238000003860 storage Methods 0.000 claims description 7
- 230000015654 memory Effects 0.000 description 16
- 238000012795 verification Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 4
- 230000003936 working memory Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000002730 additional effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the present invention relates to a cryptographic method with public and private keys. It can be used in all applications in which it is necessary to ensure the confidentiality of messages transmitted on any channel and / or to identify with certainty a device with which messages are exchanged.
- the confidentiality of messages transmitted between two devices A and B on any communication channel is obtained by encrypting the information transmitted to make it unintelligible to people for whom it is not intended.
- the certain identification of a device is based on the calculation of the digital signature of a message.
- two types of cryptographic process can be used, the so-called symmetric, with secret keys, of which a well-known example is DES ... the so-called asymmetric, using a pair of public and private keys and described in "New directions in Cryptography IEEE Transactions on Information Theory, Nov. 1976, by MM Diffie and Hellman.
- a well-known example of an asymmetric process is the RSA, named after its inventors Ronald Rivest, Adi Shamir and Léonard Adleman. A description of this RSA process can be found in US Patent 4,405,829.
- An asymmetric cryptographic process is usually used for signature generation / verification.
- a user who wants to prove his identity uses a private key, known only to him, to produce a digital signature s of a message m, signature which he transmits to the recipient device.
- the latter implements signature verification using the user's public key.
- Any device thus has the capacity to verify the signature of a user, by taking cognizance of the public key of this user and by applying it in the verification algorithm. But only the user concerned has the capacity generate the correct signature using their private key.
- This process is for example widely used in access control or banking transaction systems. It is generally coupled with the use of an encryption method, to encrypt the signature before transmitting it.
- DSA Digital Signature Algorithm
- the RSA comprises a step of generating the public K and private K 'keys for a given device in which the procedure is as follows:
- This signature s is transmitted to a recipient B.
- a hash function is previously applied to the number m before calculating the signature, which may consist of bit permutations and / or compression.
- a cryptography process like the RSA is such that it allows any number between 0 and n-1 to be encrypted with the public key (n, e).
- n public key
- e public key
- the encryption process is then applied to each of these numbers.
- m may be equal to M, or be only a part of it.
- the message or a number representative of the message is then denoted indifferently by m.
- An object of the invention is an asymmetric cryptography method different from those based on RSA.
- An object of the invention is a method based on other properties, which can be applied both in encryption of messages and in generation of signatures.
- An object of the invention is a method of cryptography which allows, in certain configurations, a faster processing time.
- the invention relates to a cryptographic method according to claim 1.
- FIG. 1 is a functional diagram of a cryptographic communication system of asymmetrical type
- FIG. 2 is a block diagram of a communicating device used in a cryptographic communication system according to the invention
- FIG. 3 is a flowchart of a message encryption / decryption session using the cryptographic method according to the invention.
- FIG. 4 is a flowchart of a signature generation / verification session using the cryptographic method according to the invention.
- a mod b (a modulo b) is the modular residue of a relatively to b and designates the unique integer strictly less than b such that b divides (a - a mod b).
- PPCM (a, b) denotes the smallest common multiple of a and b.
- PGCD (a, b) denotes the greatest common divisor of a and b.
- V xeUn, V ye Un, log n (xy mod n 2 ) log n (x) + log n (y) mod n.
- FIG. 1 represents a cryptographic communication system, using an asymmetric cryptographic method. It includes communicating devices, in example A and B, on a communication channel 1. In the example, a bidirectional channel is shown. Each device contains a pair of public K and private K 'keys.
- the public keys are for example published in a public file 2 such as a directory, which each device can consult. In this public file, we will thus find the public key K A of device A and that K B of device B.
- the private key K 'of each device is kept secretly by him, typically in a secure area of non-volatile memory.
- the device A thus contains in secret memory its private key K ' A and the device B thus contains in secret memory its private key K' B. They also keep their public key, but in a memory area without special access protection.
- the device A can encrypt a message m into a cryptogram c A using the public key K B of the device B; the latter can decrypt c A using his private key K ' B , which he secretly keeps.
- the device B can encrypt a message m in a cryptogram C ⁇ using the public key K A of the device A; the latter can decrypt C ⁇ using his private key K ' A , which he secretly keeps.
- each device comprises at least, as shown in FIG. 2, processing means 10, that is to say a central processing unit (CPU), comprising in particular different registers R for the calculation, a communication interface 11 with the communication channel, and storage means.
- processing means generally include a program memory 12 (ROM, EPROM, EEPROM) and a working memory (RAM) 13.
- ROM read-only memory
- EPROM erasable programmable read-only memory
- RAM working memory
- each device keeps its secret data in a secure access area 120 provided in program memory and its public data in a normal access area of this memory.
- the working memory makes it possible to temporarily store the time necessary for calculations, messages to be encrypted, cryptograms to be deciphered, or even intermediate calculation results.
- the processing and storage means thus make it possible to execute programs linked to the application, and in particular to carry out the calculations corresponding to the implementation of the method of cryptography for the encryption / decryption of messages and / or the generation / verification of signatures according to the invention.
- These calculations include in particular, as will be seen in detail below, power elevations, modular residues and inversions.
- the devices can also include a generator 14 of random or pseudo-random number r, which can intervene in the abovementioned calculations, in certain variant embodiments.
- This generator is framed in dotted lines in FIG. 2, to indicate that it is not necessary for the production of all the variant embodiments according to the invention.
- Such devices used in the invention are well known, and correspond for example to those which are used in the cryptographic communication systems of the state of the art, implementing the RSA. They will therefore not be detailed further.
- a practical example of a cryptographic communication system is the system formed by bank servers and smart cards for managing financial transactions. But there are many other applications, such as applications related to electronic commerce.
- This flow diagram represents a communication sequence between a device A and a device B on a communication channel 20.
- These devices include at least the processing, storage and communication means described in relation to FIG. 2.
- the cryptographic method according to the invention comprises a method for generating the public K and private K 'keys. According to the invention, this method of generating the public and private keys of a device comprises the following steps:
- This condition b) indicates that the order of the number g in the set (Z / n 2 Z) * of whole numbers from 0 to n 2 is a non-zero multiple of the number n, according to the notations defined above.
- the public key K is then formed by the number n and the number g.
- the private key is formed by the numbers p, q and ⁇ (n) or only by the numbers p and q, ⁇ (n) which can be recalculated each time the secret key is used.
- the public and private keys of each device are generated. This generation may be carried out, depending on the devices considered and the applications, by the devices themselves or by an external organ.
- the public keys are put in a file accessible to the public.
- the encryption method according to a first embodiment of the invention therefore consists in taking the parameter g of the public key, raising it to the power m, and calculating the modular residue relative to n 'On note that in the RSA, it is the message m which is raised to the power whereas in the invention, the message m is used as an exponent.
- the device B which receives the encrypted message, that is to say the cryptogram c, then implements a decryption method according to the invention with the parameters of its private key.
- This decryption process includes the following calculation:
- the device must then keep these quantities as secret data.
- a second embodiment of the invention comprises the use of a random number, provided by a random (or pseudo-random) number generator, in the encryption method, so that for the same message m to be transmitted, the calculated cryptogram c will be different each time.
- the security of the communication system is therefore greater.
- the decryption process is unchanged.
- This second embodiment of the invention comprises two variants.
- This second variant in practice requires a longer processing time than the first, but it offers greater security.
- the method for generating public and private keys is then as follows: - secret selection of an integer u and two large prime numbers p and q distinct and of similar size such that u divides (p-1) and divides (q-1).
- the public key K is then formed by the number n and the number g.
- the private key consists of the integers (p, q, u) kept secretly in the device.
- u PGCD (p- 1, q- 1)
- u will be chosen first, to improve the security of the process, and of small size, typically 160 bits.
- the Chinese Rest Theorem is implemented, using the log p and log q functions already seen to perform the decryption calculation.
- the encryption method and the decryption method are such that they have the particularity of being permutations on the group of integers modulo n.
- the cryptogram c obtained by applying the encryption method on m and the signature s obtained by applying the decryption method on m are also on k bits.
- This characteristic gives the cryptographic process the additional property of being able be used for encryption / decryption as well as generation / verification of signatures.
- the decryption method is used as the signature generation method and the encryption method as the signature verification method.
- This decryption method consists in performing the following calculations:
- m 1 log n (c ⁇ (n) mod n 2 ) .log n (g ⁇ (n) mod n 2 ) _1 mod n.
- variants of the decryption method according to this fourth embodiment of the invention are applicable, which make it possible to reduce the processing time necessary to decrypt a given message. They are useful when the device has a large number of cryptograms to decrypt.
- the device B only has to perform the following calculations:
- m 1 log n (c ⁇ (n) mod n 2 ) ⁇ n, g mod n.
- the device which wants to decipher a cryptogram c according to this second variant then performs the following successive calculations:
- the fourth embodiment of the i has just been described makes it possible to signature verification.
- the invention which has just been described is applicable in all systems where it is desired to be able to encrypt and / or sign messages. It widens the possibilities of adaptation to different applications, depending on whether one is looking for more security, or an increased processing speed.
- the third embodiment of the invention the computation complexity of which is only quadratic (function of the square of the size of n) offers a real advantage in terms of speed, insofar as all the State of the art methods have a higher order of complexity (function of the cube of the size of n).
- Such an advantage is of particular interest to all applications using portable devices, such as smart cards and more particularly low cost devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9900341 | 1999-01-14 | ||
FR9900341A FR2788650B1 (fr) | 1999-01-14 | 1999-01-14 | Procede cryptographique a cles publique et privee |
PCT/FR1999/002918 WO2000042734A1 (fr) | 1999-01-14 | 1999-11-25 | Procede cryptographique a cles publique et privee |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1151576A1 true EP1151576A1 (fr) | 2001-11-07 |
EP1151576B1 EP1151576B1 (fr) | 2007-03-07 |
Family
ID=9540854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99973617A Expired - Lifetime EP1151576B1 (fr) | 1999-01-14 | 1999-11-25 | Procede cryptographique a cles publique et privee |
Country Status (9)
Country | Link |
---|---|
US (1) | US7054444B1 (fr) |
EP (1) | EP1151576B1 (fr) |
JP (1) | JP4137385B2 (fr) |
CN (1) | CN1338166A (fr) |
AU (1) | AU1390200A (fr) |
DE (1) | DE69935455T2 (fr) |
ES (1) | ES2286910T3 (fr) |
FR (1) | FR2788650B1 (fr) |
WO (1) | WO2000042734A1 (fr) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10061697A1 (de) * | 2000-12-12 | 2002-06-27 | Infineon Technologies Ag | Verfahren und Vorrichtung zum Ermitteln eines Schlüsselpaars und zum Erzeugen von RSA-Schlüsseln |
US7141822B2 (en) * | 2001-02-09 | 2006-11-28 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device and method for manufacturing the same |
ITTO20010694A1 (it) * | 2001-07-13 | 2003-01-13 | Univ Roma | Metodo di crittografia. |
GB2391772B (en) * | 2002-08-10 | 2005-05-11 | Clive Neil Galley | Public-key cryptosystem |
US20050157872A1 (en) * | 2003-11-12 | 2005-07-21 | Takatoshi Ono | RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus |
EP1815636B1 (fr) * | 2004-11-11 | 2012-02-22 | Certicom Corp. | Nouvelle fonction a sens unique avec trappe sur des courbes elliptiques, et application pour permettre le chiffrement asymetrique et des signatures plus courtes |
FR2879866B1 (fr) * | 2004-12-22 | 2007-07-20 | Sagem | Procede et dispositif d'execution d'un calcul cryptographique |
JP4758110B2 (ja) * | 2005-02-18 | 2011-08-24 | 株式会社エヌ・ティ・ティ・ドコモ | 通信システム、暗号化装置、鍵生成装置、鍵生成方法、復元装置、通信方法、暗号化方法、暗号復元方法 |
US7774607B2 (en) * | 2006-12-18 | 2010-08-10 | Microsoft Corporation | Fast RSA signature verification |
US8903090B2 (en) * | 2008-04-29 | 2014-12-02 | International Business Machines Corporation | Securely classifying data |
US8170216B2 (en) * | 2008-06-18 | 2012-05-01 | Apple Inc. | Techniques for validating and sharing secrets |
US8630422B2 (en) * | 2009-11-10 | 2014-01-14 | International Business Machines Corporation | Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus |
US8861716B2 (en) | 2010-03-30 | 2014-10-14 | International Business Machines Corporation | Efficient homomorphic encryption scheme for bilinear forms |
US8532289B2 (en) | 2010-08-16 | 2013-09-10 | International Business Machines Corporation | Fast computation of a single coefficient in an inverse polynomial |
WO2012149395A1 (fr) | 2011-04-29 | 2012-11-01 | International Business Machines Corporation | Chiffrement complètement homomorphique |
US9281941B2 (en) | 2012-02-17 | 2016-03-08 | International Business Machines Corporation | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
JP5965873B2 (ja) * | 2013-08-29 | 2016-08-10 | 日本電信電話株式会社 | 暗号文生成装置、暗号文生成方法およびプログラム |
CN103701586A (zh) * | 2013-11-07 | 2014-04-02 | 金硕澳门离岸商业服务有限公司 | 获取密钥的方法和装置 |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
US10690904B2 (en) | 2016-04-12 | 2020-06-23 | Stryker Corporation | Multiple imaging modality light source |
US20190318118A1 (en) * | 2018-04-16 | 2019-10-17 | International Business Machines Corporation | Secure encrypted document retrieval |
US10289816B1 (en) | 2018-06-08 | 2019-05-14 | Gsfm Llc | Methods, systems, and devices for an encrypted and obfuscated algorithm in a computing environment |
WO2020174515A1 (fr) | 2019-02-25 | 2020-09-03 | 日本電気株式会社 | Système de chiffrement, dispositif de génération de clé, procédé de génération de clé, programme de génération de clé et dispositif d'opération homomorphe |
CN111683071B (zh) * | 2020-05-29 | 2023-02-28 | 百度在线网络技术(北京)有限公司 | 区块链的隐私数据处理方法、装置、设备以及存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5199070A (en) * | 1990-12-18 | 1993-03-30 | Matsushita Electric Industrial Co., Ltd. | Method for generating a public key |
JPH10301491A (ja) * | 1997-04-28 | 1998-11-13 | Ibm Japan Ltd | 暗号通信方法とシステム |
DE69840959D1 (de) * | 1997-12-17 | 2009-08-20 | Nippon Telegraph & Telephone | Verschlüsselungs- und Entschlüsselungsvorrichtungen für Kryptosysteme mit öffentlichem Schlüssel und Aufzeichnungsmedium mit darauf gespeicherten zugehörigen Verarbeitungsprogrammen. |
US6345098B1 (en) * | 1998-07-02 | 2002-02-05 | International Business Machines Corporation | Method, system and apparatus for improved reliability in generating secret cryptographic variables |
-
1999
- 1999-01-14 FR FR9900341A patent/FR2788650B1/fr not_active Expired - Fee Related
- 1999-11-25 DE DE69935455T patent/DE69935455T2/de not_active Expired - Lifetime
- 1999-11-25 US US09/889,362 patent/US7054444B1/en not_active Expired - Lifetime
- 1999-11-25 JP JP2000594220A patent/JP4137385B2/ja not_active Expired - Lifetime
- 1999-11-25 WO PCT/FR1999/002918 patent/WO2000042734A1/fr active IP Right Grant
- 1999-11-25 EP EP99973617A patent/EP1151576B1/fr not_active Expired - Lifetime
- 1999-11-25 AU AU13902/00A patent/AU1390200A/en not_active Abandoned
- 1999-11-25 CN CN99816477.1A patent/CN1338166A/zh active Pending
- 1999-11-25 ES ES99973617T patent/ES2286910T3/es not_active Expired - Lifetime
Non-Patent Citations (1)
Title |
---|
See references of WO0042734A1 * |
Also Published As
Publication number | Publication date |
---|---|
DE69935455T2 (de) | 2007-11-29 |
JP4137385B2 (ja) | 2008-08-20 |
JP2002535878A (ja) | 2002-10-22 |
DE69935455D1 (de) | 2007-04-19 |
ES2286910T3 (es) | 2007-12-01 |
FR2788650A1 (fr) | 2000-07-21 |
CN1338166A (zh) | 2002-02-27 |
US7054444B1 (en) | 2006-05-30 |
AU1390200A (en) | 2000-08-01 |
WO2000042734A1 (fr) | 2000-07-20 |
FR2788650B1 (fr) | 2001-02-16 |
EP1151576B1 (fr) | 2007-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1151576B1 (fr) | Procede cryptographique a cles publique et privee | |
CN106161034B (zh) | 使用乘法秘密共享的rsa解密 | |
EP2256987B1 (fr) | Protection d'une génération de nombres premiers pour algorithme RSA | |
EP3010177A1 (fr) | Procédé d'authentification d'un dispositif client auprès d'un serveur à l'aide d'un élément secret | |
FR2759226A1 (fr) | Protocole de verification d'une signature numerique | |
EP2296086B1 (fr) | Protection d'une génération de nombres premiers contre des attaques par canaux cachés | |
WO2001056222A1 (fr) | Procede de communication avec sequestre et recuperation de cle de chiffrement | |
EP0963638B1 (fr) | Procede de signature numerique | |
EP0666664B1 (fr) | Procédé de signature numérique et d'authentification de messages utilisant un logarithme discret avec un nombre réduit de multiplications modulaires | |
CN109361506B (zh) | 信息处理方法 | |
EP1829279A2 (fr) | Procede et dispositif d'execution d'un calcul cryptographique | |
EP0962069B1 (fr) | Systeme cryptographique comprenant un systeme de chiffrement et de dechiffrement et un systeme de sequestre de cles | |
EP0980607A1 (fr) | Generateur pseudo-aleatoire base sur une fonction de hachage pour systemes cryptographiques necessitant le tirage d'aleas | |
EP1642413B1 (fr) | Procede de chiffrement/dechiffrement d un message et disposi tif associe | |
EP1520370A1 (fr) | Procede et dispositifs cryptographiques permettant d alleger les calculs au cours de transactions | |
FR2899750A1 (fr) | Procede et terminal pour securiser la generation d'une cle de chiffrement | |
EP4070502A1 (fr) | Procédé de cogénération d'un matériel cryptographique partagé, dispositifs, système et programme d'ordinateur correspondant | |
JP3820555B2 (ja) | 鍵生成情報作成装置及び鍵生成情報作成プログラム | |
FR3143243A1 (fr) | Signature et dechiffrement de message securises par double rsa-crt | |
FR3070517A1 (fr) | Systeme et procede d'authentification et de signature numerique | |
WO2008034971A2 (fr) | Procede de cryptage de messages a destination d'au moins deux recepteurs, dispositif de cryptage et dispositif de decryptage associes | |
WO2006045660A2 (fr) | Procede de generation de signature a la volee avec preuve de securite | |
WO2006064112A2 (fr) | Procédé de traitement de données utilisant une fonction de couplage et dispositif associé |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20010814 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17Q | First examination report despatched |
Effective date: 20050502 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE ES FR GB IT |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REF | Corresponds to: |
Ref document number: 69935455 Country of ref document: DE Date of ref document: 20070419 Kind code of ref document: P |
|
RBV | Designated contracting states (corrected) |
Designated state(s): DE ES FR GB IT |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20070614 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2286910 Country of ref document: ES Kind code of ref document: T3 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20071210 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP Ref country code: FR Ref legal event code: CD |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: S117 Free format text: REQUEST FILED; REQUEST FOR CORRECTION UNDER SECTION 117 FILED ON 26 APRIL 2010 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20110616 AND 20110622 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 69935455 Country of ref document: DE Representative=s name: HOFFMANN - EITLE, DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 69935455 Country of ref document: DE Representative=s name: HOFFMANN - EITLE PATENT- UND RECHTSANWAELTE PA, DE Effective date: 20120629 Ref country code: DE Ref legal event code: R082 Ref document number: 69935455 Country of ref document: DE Representative=s name: HOFFMANN - EITLE, DE Effective date: 20120629 Ref country code: DE Ref legal event code: R081 Ref document number: 69935455 Country of ref document: DE Owner name: GEMALTO SA, FR Free format text: FORMER OWNER: GEMPLUS, GEMENOS, FR Effective date: 20120629 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 19 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20181023 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20181024 Year of fee payment: 20 Ref country code: IT Payment date: 20181023 Year of fee payment: 20 Ref country code: GB Payment date: 20181024 Year of fee payment: 20 Ref country code: ES Payment date: 20181203 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 69935455 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20191124 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20191124 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20200903 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20191126 |